aboutsummaryrefslogtreecommitdiffstats
path: root/accounts/accounts_test.go
blob: 9d09156afc1de03c9df9c240294a87a7361e1ace (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
// Copyright 2015 The go-ethereum Authors
// This file is part of go-ethereum.
//
// go-ethereum is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// go-ethereum is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with go-ethereum.  If not, see <http://www.gnu.org/licenses/>.

package accounts

import (
    "io/ioutil"
    "os"
    "testing"
    "time"

    "github.com/ethereum/go-ethereum/crypto"
    "github.com/ethereum/go-ethereum/crypto/randentropy"
)

func TestSign(t *testing.T) {
    dir, ks := tmpKeyStore(t, crypto.NewKeyStorePlain)
    defer os.RemoveAll(dir)

    am := NewManager(ks)
    pass := "" // not used but required by API
    a1, err := am.NewAccount(pass)
    toSign := randentropy.GetEntropyCSPRNG(32)
    am.Unlock(a1.Address, "")

    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal(err)
    }
}

func TestTimedUnlock(t *testing.T) {
    dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
    defer os.RemoveAll(dir)

    am := NewManager(ks)
    pass := "foo"
    a1, err := am.NewAccount(pass)
    toSign := randentropy.GetEntropyCSPRNG(32)

    // Signing without passphrase fails because account is locked
    _, err = am.Sign(a1, toSign)
    if err != ErrLocked {
        t.Fatal("Signing should've failed with ErrLocked before unlocking, got ", err)
    }

    // Signing with passphrase works
    if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
        t.Fatal(err)
    }

    // Signing without passphrase works because account is temp unlocked
    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
    }

    // Signing fails again after automatic locking
    time.Sleep(150 * time.Millisecond)
    _, err = am.Sign(a1, toSign)
    if err != ErrLocked {
        t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
    }

}

func TestOverrideUnlock(t *testing.T) {
    dir, ks := tmpKeyStore(t, crypto.NewKeyStorePassphrase)
    defer os.RemoveAll(dir)

    am := NewManager(ks)
    pass := "foo"
    a1, err := am.NewAccount(pass)
    toSign := randentropy.GetEntropyCSPRNG(32)

    // Unlock indefinitely
    if err = am.Unlock(a1.Address, pass); err != nil {
        t.Fatal(err)
    }

    // Signing without passphrase works because account is temp unlocked
    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
    }

    // reset unlock to a shorter period, invalidates the previous unlock
    if err = am.TimedUnlock(a1.Address, pass, 100*time.Millisecond); err != nil {
        t.Fatal(err)
    }

    // Signing without passphrase still works because account is temp unlocked
    _, err = am.Sign(a1, toSign)
    if err != nil {
        t.Fatal("Signing shouldn't return an error after unlocking, got ", err)
    }

    // Signing fails again after automatic locking
    time.Sleep(150 * time.Millisecond)
    _, err = am.Sign(a1, toSign)
    if err != ErrLocked {
        t.Fatal("Signing should've failed with ErrLocked timeout expired, got ", err)
    }
}

//

func tmpKeyStore(t *testing.T, new func(string) crypto.KeyStore) (string, crypto.KeyStore) {
    d, err := ioutil.TempDir("", "eth-keystore-test")
    if err != nil {
        t.Fatal(err)
    }
    return d, new(d)
}